search for: channel_input_port_open

Displaying 5 results from an estimated 5 matches for "channel_input_port_open".

2000 Sep 25
1
How do I get the username in channel_input_port_open
Hello, Does anyone know how to get the username of the user (already authenticated and logged in) who is sending data to a forwarded tunnel from the channel_input_port_open function in channels.c?? I've tried numerous things, and all I can get is the IP address that is sending the data and where it is going to be sent to. All I want is the username or the UID Here is the chain of events that are happening: User logs on to SSHServer and authenticates Sets up loca...
2003 Jan 29
0
[PATCH] features for restricted shell environments
...t num_permitted_opens = 0; + +/* Don't allow any more to be added. */ +static int fix_permitted_opens = 0; + /* * If this is true, all opens are permitted. This is the case on the server * on which we have to trust the client anyway, and the user could do @@ -1972,7 +1978,7 @@ } void -channel_input_port_open(int type, u_int32_t seq, void *ctxt) +channel_input_port_open(int type, u_int32_t seq, void *ctxt, int loud) { Channel *c = NULL; u_short host_port; @@ -1989,6 +1995,8 @@ originator_string = xstrdup("unknown (remote did not supply name)"); } packet_check_eom(); + if (loud) +...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...ol 2 + server listening for remote forward --> false */ + channel_request_local_forwarding(port, hostname, host_port, + gateway_ports, 0); /* Free the argument string. */ xfree(hostname); @@ -1621,22 +1874,49 @@ return sock; } +/* Jarno: This is only a wrapper for channel_input_port_open that + * server calls after receiving PORT_OPEN. The only purpose for this is to + * make it possible to refuse forwarding requests (in server). + */ +void server_channel_input_port_open(int type, int plen) +{ + int remote_channel = packet_get_int(); + +#ifndef DISABLE_FORWARDING + if (!allow_port...
2004 Jan 19
3
Security suggestion concering SSH and port forwarding.
Hi, sorry if it is the wrong approuch to suggest improvments to OpenSSH, but here comes my suggestion: I recently stumbled upon the scponly shell which in it's chroot:ed form is an ideal solution when you want to share some files with people you trust more or less. The problem is, if you use the scponlyc as shell, port forwarding is still allowed. This can of course be dissallowed in
2001 Oct 24
2
disable features
...n, void *ctxt) { @@ -1871,6 +1953,7 @@ "non-closed channel %d (type %d).", id, c->type); channel_free(c); } +#endif void channel_input_open_confirmation(int type, int plen, void *ctxt) @@ -2005,6 +2088,7 @@ c->remote_window += adjust; } +#ifdef WITH_TCPFWD void channel_input_port_open(int type, int plen, void *ctxt) { @@ -2042,7 +2126,7 @@ } xfree(host); } - +#endif /* -- tcp forwarding */ @@ -2052,6 +2136,7 @@ IPv4or6 = af; } +#ifdef WITH_X11FWD /* * Initiate forwarding of connections to local port "port" through the secure * channel to host:port...